<?xml version="1.0" encoding="UTF-8"?>
<collection xmlns="http://www.loc.gov/MARC21/slim">
 <record>
  <leader>02798cam a2200325 a 4500</leader>
  <controlfield tag="001">1/36735</controlfield>
  <controlfield tag="008">140627s2003    ne            001 0 eng  </controlfield>
  <datafield tag="020" ind1=" " ind2=" ">
   <subfield code="a">9781555583064</subfield>
  </datafield>
  <datafield tag="020" ind1=" " ind2=" ">
   <subfield code="a">1555583067</subfield>
  </datafield>
  <datafield tag="020" ind1=" " ind2=" ">
   <subfield code="a">9780080530185 (electronic bk.)</subfield>
  </datafield>
  <datafield tag="020" ind1=" " ind2=" ">
   <subfield code="a">0080530184 (electronic bk.)</subfield>
  </datafield>
  <datafield tag="035" ind1=" " ind2=" ">
   <subfield code="l">39328</subfield>
  </datafield>
  <datafield tag="040" ind1=" " ind2=" ">
   <subfield code="a">OPELS</subfield>
   <subfield code="b">eng</subfield>
   <subfield code="c">OPELS</subfield>
   <subfield code="d">OKU</subfield>
   <subfield code="d">OCLCQ</subfield>
   <subfield code="d">N$T</subfield>
   <subfield code="d">YDXCP</subfield>
   <subfield code="d">IDEBK</subfield>
   <subfield code="d">E7B</subfield>
   <subfield code="d">MERUC</subfield>
   <subfield code="d">UMI</subfield>
   <subfield code="d">DEBSZ</subfield>
   <subfield code="d">GR-PeUP</subfield>
  </datafield>
  <datafield tag="100" ind1="1" ind2=" ">
   <subfield code="a">Rittinghouse, John W.</subfield>
  </datafield>
  <datafield tag="245" ind1="1" ind2="0">
   <subfield code="a">Cybersecurity operations handbook</subfield>
   <subfield code="h">[electronic resource] /</subfield>
   <subfield code="c">John W. Rittinghouse, William M. Hancock.</subfield>
  </datafield>
  <datafield tag="260" ind1=" " ind2=" ">
   <subfield code="a">Amsterdam ;</subfield>
   <subfield code="a">Boston :</subfield>
   <subfield code="b">Elsevier Digital Press,</subfield>
   <subfield code="c">c2003.</subfield>
  </datafield>
  <datafield tag="300" ind1=" " ind2=" ">
   <subfield code="a">1 online resource (xli, 1287 p.) :</subfield>
   <subfield code="b">ill.</subfield>
  </datafield>
  <datafield tag="504" ind1=" " ind2=" ">
   <subfield code="a">Includes bibliographical references and index.</subfield>
  </datafield>
  <datafield tag="505" ind1="0" ind2=" ">
   <subfield code="a">Why worry about security? -- Network security management basics -- Security foundations -- Firewalls and perimeters -- VPNs and remote access -- Intrusion detection in depth -- Securing communications -- Keys, signatures, certificates, and PKI -- Hacker exploits -- Incident handling basics -- Forensics, investigation, and response -- Security diligence -- Business-continuity planning -- Auditing fundamentals -- Security-management issues -- Outsourcing and security -- Security service level agreements -- Future trends in security -- Sample policy documents.</subfield>
  </datafield>
  <datafield tag="520" ind1=" " ind2=" ">
   <subfield code="a">Cybersecurity Operations Handbook is the first book for daily operations teams who install, operate and maintain a range of security technologies to protect corporate infrastructure. Written by experts in security operations, this book provides extensive guidance on almost all aspects of daily operational security, asset protection, integrity management, availability methodology, incident response and other issues that operational teams need to know to properly run security products and services in a live environment. Provides a master document on Mandatory FCC Best Practices and complete coverage of all critical operational procedures for meeting Homeland Security requirements. First book written for daily operations teams Guidance on almost all aspects of daily operational security, asset protection, integrity management Critical information for compliance with Homeland Security.</subfield>
  </datafield>
  <datafield tag="650" ind1=" " ind2="4">
   <subfield code="a">Computer security.</subfield>
  </datafield>
  <datafield tag="650" ind1=" " ind2="4">
   <subfield code="a">Computer networks</subfield>
   <subfield code="x">Security measures.</subfield>
  </datafield>
  <datafield tag="655" ind1=" " ind2="4">
   <subfield code="a">Electronic books.</subfield>
  </datafield>
  <datafield tag="700" ind1="1" ind2=" ">
   <subfield code="a">Hancock, Bill,</subfield>
   <subfield code="d">1957-</subfield>
  </datafield>
  <datafield tag="852" ind1=" " ind2=" ">
   <subfield code="a">INST</subfield>
   <subfield code="b">UNIPILB</subfield>
   <subfield code="c">EBOOKS</subfield>
   <subfield code="e">20100623</subfield>
   <subfield code="p">00b39328</subfield>
   <subfield code="q">00b39328</subfield>
   <subfield code="t">ONLINE</subfield>
   <subfield code="y">0</subfield>
  </datafield>
  <datafield tag="856" ind1="4" ind2="0">
   <subfield code="3">ScienceDirect</subfield>
   <subfield code="u">http://www.sciencedirect.com/science/book/9781555583064</subfield>
  </datafield>
  <datafield tag="856" ind1="4" ind2=" ">
   <subfield code="d">/webopac/covers/02/39328_9781555583064.jpg</subfield>
  </datafield>
  <datafield tag="856" ind1="4" ind2=" ">
   <subfield code="d">/webopac/covers/02/39328_1555583067.jpg</subfield>
  </datafield>
  <datafield tag="856" ind1="4" ind2=" ">
   <subfield code="d">/webopac/covers/02/39328_9780080530185.jpg</subfield>
   <subfield code="z">(electronic bk.)</subfield>
  </datafield>
  <datafield tag="856" ind1="4" ind2=" ">
   <subfield code="d">/webopac/covers/02/39328_0080530184.jpg</subfield>
   <subfield code="z">(electronic bk.)</subfield>
  </datafield>
 </record>
</collection>
